Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
The “non-sensitive data” trap: the costly mistake for companies
With 50 dollars and physical access to the server, the Cloud goes to hell
Discovering the Emotional Firewall! The Vulnerability No One Is Patching
Not the children! 8,000 personal data of children from a nursery school are at risk of being published.
Programming in crisis: Junior job openings plummet as AI transforms the workplace.
Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

The “non-sensitive data” trap: the costly mistake for companies
Stefano Gazzella - September 30th, 2025
A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

With 50 dollars and physical access to the server, the Cloud goes to hell
Redazione RHC - September 30th, 2025
A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environments. Using a device costing less than $50, they...

Discovering the Emotional Firewall! The Vulnerability No One Is Patching
Daniela Farina - September 30th, 2025
There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.
Redazione RHC - September 30th, 2025
A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare centers run by London-based Kido International . The...

Programming in crisis: Junior job openings plummet as AI transforms the workplace.
Redazione RHC - September 30th, 2025
Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of...

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?
Redazione RHC - September 29th, 2025
In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

